题目列表(包括答案和解析)
They may be just passing your office, computer bag slung (悬挂) over one shoulder. Or they may be sitting in a car outside it, causally tapping away at a laptop. They look like innocent passers-by. In fact, they are stealing your corporate secrets.
Drive-by hacking is the trendy term given to the practice of breaking into wireless computer networks from outside the buildings that house them. A recent study in the UK, sponsored by RSA Data Security, found that two-thirds of organizations with wireless networks were risking their data in this way. Security experts patrolled (巡逻) several streets in the City of London seeking evidence of wireless networks in operation.
Of 124 that they identified, 83 were sending data without encrypting(加密)them. Such data could readily be picked up by a passer-by armed only with a portable computer, a wireless modem and a few pieces of software that can be freely downloaded from the Internet.
The data could include sensitive company documents containing valuable information. Or they could be e-mail identities and passwords that could be used by hackers to log into corporate networks as if they were legal users.
Most companies using wireless networking technology do not take even the simplest of measures to protect their data. Nearly all wireless network technology comes with some basic security features that need only to be activated (激活) in order to give a minimum level of security, for example, by encrypting the data being passed over the network.
Raymon Kruck, business development manager at Check Point Software, a security technology specialist, believes this could be partly a psychological problem. People see the solid walls of their building as safeguards and forget that wireless networks can extend up to 200 meters beyond physical walls.
Companies without any security at all on their wireless networks make it ridiculously easy for hackers to break in. Switching on the security that comes with the network technology should be automatic. Then there are other basic steps a company can take, says Mr. Kruck, such as changing the passwords on the network from the default (默认) setting.
Companies can also install firewalls, which form a barrier between the internal network and the public Internet. They should also check their computer records regularly to spot any abnormal activity, which might betray the presence of a hacker.
【小题1】According to the study sponsored by RSA Data Security, two thirds of the subjects _______.
| A.had most of their company data stolen |
| B.depended on wireless computer networks |
| C.were exposed to drive-by hacking |
| D.were unaware of the risk of wireless hacking |
| A.The number of computer hacking incidents. |
| B.The number of wireless computer networks identified. |
| C.The way in which data are sent and received. |
| D.The way in which data are hacked and stolen. |
| A.data encryption program | B.password security programs |
| C.illegal-user detection | D.firewall |
| A.wireless signal administration | B.changes in user’s awareness |
| C.users’ psychological health | D.stronger physical walls |
| A.book review | B.science fiction | C.textbook | D.computer magazine |
Three 21 ago, my family got our first computer. 22 the beginning of this summer, I found it was too old and I wanted to get a 23 one. After my father. and I talked for a long time, he 24 . We went to many shops and read many ads. 25 we bought an HP computer.
During the first week, I noticed 26 our computer had some problems. I spent many hours 27 to fix it, but it 28 work. So I 29 to phone the HP company and ask them 30 to work out my problem. They told me to wait until the next morning because all their workers were 31 that day.
The next morning two workers came. It took them many hours to mend it, but the computer 32 did not work. My dad had no other way but to return the whole thing.
A few days later, we decided that I should go on the Internet and order some parts to build a new computer by 33 .
It was not an easy job for me to build a new computer. I tried many times, and in the end I was successful. From these setbacks(挫折), I have learned a lot. Now I believe that if the HP computer hadn't had any problems, 34 I would not have learned how to build the new one. Even though I spent lots of time on it, I know it wasn't 35 .
| 【小题1】 |
|
| 【小题2】 |
|
| 【小题3】 |
|
| 【小题4】 |
|
| 【小题5】 |
|
| 【小题6】 |
|
| 【小题7】 |
|
| 【小题8】 |
|
| 【小题9】 |
|
| 【小题10】 |
|
| 【小题11】 |
|
| 【小题12】 |
|
| 【小题13】 |
|
| 【小题14】 |
|
| 【小题15】 |
|
Right now you can pay ______ you had to several years ago for a cool computer.
A. one third as much as??????????????? B. as one third much as
C. as much as one third??????????????? D. as much one third as
根据短文内容,从短文后的选项中选出能填入空白处的最佳选项。选项中有两项为多余选项。
Do you constantly use the computer, whether for learning or entertainment? Computers give off radiation(辐射) that is bad for your health, but here are some ways to protect yourself from computer radiation.
__1___Green tea can be absorbed by the body easily into a form of vitamin A, which helps reduce radiation.__2__
It is advisable to attach a radiation filter plate(辐射过滤板)in front of your computer’s screen. Make sure to avoid putting any mental substances near your computer as these may have reflected some of the electromagnetic waves that are harmful to your health. __3__ The brighter the screen the higher the radiation there will be and vice versa.
You can also put some radiation-absorbing plants such as several cacti near your computer to prevent radiation.
Make sure you do a skincare protection before sitting in front of the computer .
___4__Wash your face soon after using the computer in order to reduce 70% of the radiation.
__ 5___ Old computer in general, has one to two times more radiation released than the new one within the same distance.
| A.And adjust the brightness of your computer screen. |
| B.Apply a layer of facial mask to protect yourself. |
| C.And adjust the sound level on your computer. |
| D.The most efficient way is by drinking some coffee regularly. |
Supermarkets are trying out new computers that make shopping carts more intelligent. They will help shoppers find paper cups or toilet soap, and keep a record of the bill.
The touch-screen devices are on show at the Food Marketing Institute’s exhibition here this week, “These devices are able to create value and get you around the store quicker,” said Michael Alexander, manager of Springboard Retail Netwo
rks Inc., which makes a smart cart computer called the Concierge.
Canadian stores will test the Concierge in July. A similar device, IBM’s “Shopping Buddy”, has recently been test-marketed at Stop & Shop stores in Massachusetts.
Neither device tells you how many fat grams or calories are in your cart, but they will flash you with items on sale. The idea is to make it easier for people to buy, not to have second thoughts that maybe you should put something back on the shelf.
“The whole model is driven by advertisers’ need to get in front of shoppers,” said Alexander. “They’re not watching 30-second TV ads anymore.”
People can use a home computer to make their shopping lists. Once at the store, a shopper can use a preferred customer card to start a system(系统)that will organize the trip around the store. If you’re looking for toothpicks, you type in the word or pick it from a list, and a map will appear on the screen showing where you are and where you can find them.
The device also keeps a reco
rd of what you buy. When you’re finished, the device figures out your bill. Then you go to the checker or place your card into a self-checkout stand and pay.
The new computerized shopping assistants don’t come cheap. The Buddy devices will cost the average store about $ 160, 000, and the Concierge will cost stores about $ 500 for each device.
【小题1】The underlined word “they”(paragraph 1)refers to ____________.
| A.supermarkets | B.shop assistants |
| C.shopping carts | D.shop managers |
| A.intelligent shopping ca |
| B.the Concierge is cheaper than the Buddy devices |
| C.shop assistants with computer knowledge are well paid |
| D.average stores prefer the Concierge to the Buddy devices |
| A.New age for supermarkets |
| B.Concierge and Shopping Buddy |
| C.New computers make shopping carts smarter |
| D.Touch-screen devices make shopping enjoyable |
湖北省互联网违法和不良信息举报平台 | 网上有害信息举报专区 | 电信诈骗举报专区 | 涉历史虚无主义有害信息举报专区 | 涉企侵权举报专区
违法和不良信息举报电话:027-86699610 举报邮箱:58377363@163.com